CVE-2012-2123
kernel: fcaps: clear the same personality flags as suid when fcaps are used
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel before 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions via a crafted application, as demonstrated by an attack that uses a parent process to disable ASLR.
La función cap_bprm_set_creds en security/commoncap.c en el núcleo de Linux antes de v3.3.3 no controla correctamente el uso de las capacidades del sistema de archivos (FCAPS aka) para la implementación de un archivo ejecutable con privilegios, lo cual permite a usuarios locales eludir las restricciones personales a través de una aplicación manipulada, como se demuestra por un ataque que utiliza un proceso padre para desactivar ASLR.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-04-04 CVE Reserved
- 2012-05-11 CVE Published
- 2024-08-06 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d52fc5dde171f030170a6cb78034d166b13c9445 | Broken Link | |
http://www.openwall.com/lists/oss-security/2012/04/20/6 | Mailing List | |
http://www.securityfocus.com/bid/53166 | Third Party Advisory | |
http://www.securitytracker.com/id?1027072 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75043 | Vdb Entry | |
https://github.com/torvalds/linux/commit/d52fc5dde171f030170a6cb78034d166b13c9445 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2012-0670.html | 2023-10-12 | |
http://rhn.redhat.com/errata/RHSA-2012-0743.html | 2023-10-12 | |
http://www.debian.org/security/2012/dsa-2469 | 2023-10-12 | |
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.3 | 2023-10-12 | |
https://bugzilla.redhat.com/show_bug.cgi?id=806722 | 2012-06-18 | |
https://access.redhat.com/security/cve/CVE-2012-2123 | 2012-06-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 3.0.29 Search vendor "Linux" for product "Linux Kernel" and version " < 3.0.29" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.1 < 3.2.16 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.1 < 3.2.16" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.3 < 3.3.3 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.3 < 3.3.3" | - |
Affected
|